Fake startups target crypto users, infiltrating their wallets

Source Cryptopolitan

Darktrace research reveals ongoing social engineering campaign targeting crypto users through fake startup companies. Scammers impersonate AI, gaming, and Web3 firms using spoofed social media accounts.

Project documentation gets hosted on legitimate platforms like Notion and GitHub. The campaign continues changing since December 2024 targeting Web3 employees globally.

Fake companies use legitimate platforms to build credible presence

Threat actors create fake startup companies with AI, gaming, video meeting software themes. Web3 and social media company facades help target cryptocurrency users specifically. These operations use compromised X accounts typically with verification to contact victims.

The attackers use legitimate platforms including Notion, Medium, and GitHub for documentation. Professional-looking websites include employee profiles, product blogs, whitepapers, and development roadmaps. X accounts appear compromised with higher follower counts adding to the appearance of legitimacy.

The scammers remain active on social media accounts posting software development updates. Product marketing content gets shared regularly while campaigns operate across platforms. Eternal Decay blockchain game created fake conference presentation photos for credibility.

The attackers even altered Italian exhibition photos making them appear as company presentations. Medium hosts blog posts about fake software products and company developments. Notion contains detailed product roadmaps and comprehensive employee listing information.

Social engineering campaign targets crypto users via fake startups, report says.
Scammers altering photo from Italian exhibition: Source

GitHub repositories feature technical software aspects using stolen open-source projects. Code names get changed to make repositories appear unique and original. Company registration information from Companies House gets linked to similar-named companies.

Gitbook details company information and lists fake investor partnerships for credibility. Gameplay images stolen from Zombie Within game appear as Eternal Decay content. Some fake companies establish merchandise stores to complete business facades.

These combined elements create convincing startup company appearances increasing infection success rates. Victims receive contact through X messages, Telegram, or Discord from employees. Fake workers offer cryptocurrency payments for software testing participation.

Malware targeting both Windows and macOS crypto wallet users

Windows versions are distributed via Electron apps that demand registration codes from impersonated employees. Bins are downloaded by users after codes are entered given via social media messaging. CloudFlare verification screens are presented prior to malware execution on target systems.

The malware gathers system profiles in username, CPU details, RAM, and graphics. MAC addresses and system UUIDs are gathered in preliminary reconnaissance phases. Token-based authentication mechanisms use tokens which are derived from application launcher URLs.

Stolen code signing certificates increase software legitimacy and evade security detection. Companies like Jiangyin Fengyuan Electronics Co. and Paperbucketmdb ApS certificates were used. Python gets retrieved and stored in temporary directories for command execution.

macOS distributions are released as DMG files containing bash scripts and binaries. Scripts use obfuscation techniques like base64 encoding and XOR encryption. AppleScript mounts malware and runs executables from temporary directories automatically.

The macOS malware performs anti-analysis checks for QEMU, VMWare, and Docker environments. Atomic Stealer targets browser data, crypto wallets, cookies, and document files. Stolen data gets compressed and sent via POST requests to servers.

Additional bash scripts establish persistence through Launch Agent configurations at login. The malware logs active application usage and window information continuously. User interaction timestamps get recorded and transmitted to collection servers periodically.

Both versions target cryptocurrency wallet data specifically for theft operations. Multiple fake companies distribute identical malware with different branding and themes.

Extensive list of fake companies identified across multiple platforms

Darktrace revealed several phony companies running through this social engineering campaign. Pollens AI impersonates collaborative creation tools using X accounts and other websites. Buzzu employs the same logos and code as Pollens but runs under different branding.

Cloudsign is reported to provide document signing platform services to business consumers. Swox is a Web3 space next-generation social network. KlastAI is closely linked to Pollens accounts and sites bearing the same branding.

Wasper uses the same logos and GitHub code as Pollens across various areas. Lunelior operates through various websites serving various groups of users in specific. BeeSync previously operated as Buzzu alias before its rebranding in January 2025.

Slax hosts social media and AI-centric sites on multiple websites. Solune reaches users through social media platform activity and messaging app usage. Eternal Decay is a blockchain gaming firm with synthetic conference presentations.

Dexis is branded the same as Swox and shared the same user base. NexVoo has multiple domains and social media platform management. NexLoop rebranded to NexoraCore by renaming GitHub repositories.

YondaAI targets social media site users and various website domain users. Every business has professional fronts through real platform integration procedures. The CrazyEvil traffer group has been operating such campaigns since 2021.

Recorded Future approximates CrazyEvil’s millions of revenue from malicious activities. The group is said to be behind attacks on crypto users, influencers, and DeFi professionals. The campaigns show extensive efforts in making legitimate business appearances.

Cryptopolitan Academy: Tired of market swings? Learn how DeFi can help you build steady passive income. Register Now

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Bitcoin ETF Inflows For 2025 Now Outpace 2024, Data ShowsUS Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
Author  Bitcoinist
Jul 16, Wed
US Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
placeholder
Ethereum Price Forecast: ETH eyes $4,000 as SharpLink Gaming expands ATM facility to $6 billionEthereum (ETH) briefly surged to $3,500 on Thursday after SharpLink Gaming (SBET) filed an amendment to increase its At-The-Market (ATM) facility by $5 billion.
Author  FXStreet
Jul 18, Fri
Ethereum (ETH) briefly surged to $3,500 on Thursday after SharpLink Gaming (SBET) filed an amendment to increase its At-The-Market (ATM) facility by $5 billion.
placeholder
U.S. House officially approves CLARITY, GENIUS, and Anti-CBDC ActsThe House passed three major crypto bills on Thursday, locking in a rare legislative win for the industry.
Author  Cryptopolitan
Jul 18, Fri
The House passed three major crypto bills on Thursday, locking in a rare legislative win for the industry.
placeholder
Cardano (ADA) Flashes Bullish Signal—Is the Rally Just Beginning?ADA is now consolidating and might attempt a clear move above the $0.8650 zone.
Author  NewsBTC
Jul 18, Fri
ADA is now consolidating and might attempt a clear move above the $0.8650 zone.
placeholder
Silver Price Forecast: XAG/USD rallies to $38.40 favoured by a softer US Dollar Silver (XAG/USD) is rallying for the third consecutive day on Friday, with bulls testing July 15 highs of 38.40 at the time of writing.
Author  FXStreet
Jul 18, Fri
Silver (XAG/USD) is rallying for the third consecutive day on Friday, with bulls testing July 15 highs of 38.40 at the time of writing.
goTop
quote